IT Governance, Risk, and Compliance:

August, 2012

The electrical signal may be changed by mechanical component failure of the communications network, or by a problem related to the characteristics of data communications. Of these two error sources, the characteristics of data communications are by far more important.
Root causes of most...

A common type of data communications risk
According to Christopher E. Strangio, the distance over which data moves within IT can vary from a few thousandths of an inch, as is the case within a single integrated circuit (IC) chip, to several feet along the main circuit board’s...

As the distance between the message source and designated destination increases, accurate transmission becomes increasingly more risky.
Data communication systems are designed with transmission speed and capacity to meet the timeliness and volume needs of defined users. Nonetheless, data...

Some IT configurations are capable of assigning whole sections of memory for prescribed operations, programs, and/or data. These assigned sections of memory can be protected by a hardware address validity check. This type of control is also known as 0 CommentsRSS FeedEmail a friend

Validity checking of datum passed to peripheral devices
A data validity check compares characters or fields that are written or read with a set of all valid characters or fields. It is particularly useful technique with peripheral devices such as printers. For example, a...

IT hardware validity checks are preventive and/or detective control measures that should be implemented to ensure appropriate data processing. An important component of enabling information integrity is sustaining data and task validity. Within...

Current events posted by various news outlets, including Fox News, the Wall Street Journal, Forbes and Yahoo.com, concerning Knight Capital’s financial debacle, present some very serious allegations regarding managerial due diligence during system development...

Deploying appropriate hardware communication controls
Hardware size and accessibility make transportability an issue because of uncertainty that an installed configuration has appropriate controls. Small IT configurations have unique hardware characteristics that distinguish...

IT echo checking to ensure data integrity and command compliance
The control purpose of an IT hardware echo check is to ensure that commands sent to peripheral, or remote, equipment are obeyed and that datum are received correctly. In this activity, the computer checks to ensure...

We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.